CROSS-REFERENCE TO RELATED APPLICATIONSThis application is a U.S. national phase entry of PCT Patent Application Serial No. PCT/FR2021/051984, filed on Nov. 9, 2021, which claims priority to French Patent Application Serial No. FR2011468, filed on Nov. 9, 2020, both of which are incorporated by reference herein.
TECHNICAL FIELDThe present invention relates to the field of authenticating a user carrying out electronic transactions using a terminal connected to a computer device or to an access to a physical system. The security of transactions constitutes an essential issue and has given rise to numerous solutions making it possible to limit the risks of fraud as regards the author of the transaction or the nature of the transaction.
Biometric recognition techniques based on imaging systems coupled with a central database storing personal information constitute a path that faces detrimental limitations. Indeed, the biometric data may vary slightly. In order to take these variations into account, it has been provided to retain only a small part of the points considered as invariant. However, this results in:
- The risk of false positives, i.e., the validation of biometric data whose invariant points are indeed identical or similar, but which actually come from two different persons. This has led to a person being arrested on the basis of fingerprints that were unusually close to those of an alleged murderer. This is also the case for the presentation of a fingerprint cast.
- The risk of false negatives, i.e., the absence of validation of biometric data from a person, whose certain invariant points were masked, or modified by an artifact, for example the wearing of a mask.
 
The invention thus relates to the field of authentication excluding biometric data, and more specifically the field of electronic transactions activated by means of a reliable unique identifier such as for example a QrCode, an alphanumeric identifier, an email address, a unique identification number such as an IBAN or a social security number, and securing the process of registering the identifier, its storage and verification to reduce the risks in the event of computer attacks on a transaction system server.
BACKGROUND AND SUMMARYThe European patent application EP 1488359A4 is known, which relates to a method making it possible to perform an online transaction via a transaction manager. The method disclosed in the invention consists in generating a one-time use transaction request identification; the transaction manager linking this identification to banking information of a subscribed user; providing the transaction request identification to the subscribed user who makes a request to purchase a product or service having a certain value from a merchant. The purchase request consists in providing the transaction request identification to the merchant. The merchant sends a payment request to the transaction manager for a transfer of funds equal to the value from the user to the merchant, with the payment request comprising the transaction request identification and the value. The transaction manager verifies the validity of the transaction request identification, and then disables the reuse of this identification. If the transaction request identification is valid, an electronic funds transfer request is sent to a financial institution to enable the transfer of the collected value from the user to the merchant, with the electronic funds transfer request comprising the banking information.
European patent EP2839603B1 discloses a user authentication method comprising executing, by a processing system, the following operations:
- receiving a request from a user to initiate an authentication session, the request comprising a unique identifier of the user,
- accessing, by means of the unique identifier, to a registration memorized in a memory associated with the user, the memorized registration comprising at least code value complexity preference data that defines a user-preferred level of complexity intended for a user in validating a user input received in response to the presentation of security matrices, and a user-defined keyword consisting of an ordered sequence of symbols comprising members of a predetermined set of symbols selected from one or more sets of symbols supported by the processing system, wherein the symbols of the ordered sequence have been previously selected by the user independently of other user selections,
- generating a one-time use security matrix that is valid only for the user during the authentication session, and that comprises a matching between each symbol within the set of predetermined symbols and a code value that is specific to the authentication session and randomly selected from a set of codes that is different from the set of predetermined symbols,
- transmitting the one-time use security matrix for presentation purposes to the user, wherein the one-time use security matrix presented to the user comprises symbols from the set of predetermined symbols matching the code values randomly selected from the set of codes,
- receiving an ordered sequence of code values selected from the one-time use security matrix and inputted by the user, based on the user-defined keyword and code value complexity preference data, in response to the presentation of the one-time use security matrix,
- validating the received ordered sequence of code values by comparing it to a matching sequence of code values generated, but not transmitted, by the processing system based on the user-defined keyword in the memorized registration, the code value complexity preference data and the one-time use security matrix, and
- generating an authentication result of the authentication session based on the comparison.
 Disadvantages
 
Background art solutions have a major technical problem because they leave open the possibilities of computer attacks. One of the sources of vulnerability lies in the management of identifiers. The knowledge of the identifier makes it possible to pass a first step of the authorization procedure to a service, the information being used for the following step which is the authentication of the user having transmitted—legally or fraudulently—a valid identifier. The security of the identifier depends on the measures taken by the user in order to preserve the secret character thereof, and where applicable on the electronic means provided on the physical medium of the identifier when it is recorded on a key, a card or a portable device such as a telephone.
The solutions of the background art have a second disadvantage that concerns the security of the authentic data recorded during the creation of a user's account. This data is generally recorded in a secured area DMZ of the computer device, but in the event of a computer attack, it is still possible to recover all of the data associated with the users' identifiers.
A third disadvantage lies in the risk of data interception and fraudulent reuse of this data. A fourth disadvantage lies in the risk of creating a false account for accessing the services of a third-party user. It is implicitly accepted that the identification is vulnerable and requires only little computation power on the user's device, insofar as security will result from be the robustness of the authentication and optionally certification protocol, requiring more powerful processing resources, pooled at the level of a computer device.
SolutionIn order to remedy these disadvantages, the invention relates according to its most general meaning, to a method for enabling secure transactions of a security identifier and, in particular, without a token, consisting in recording on a first computer device B a unique digital identifier IDiassociated with a unique user Ui, said profile IDibeing associated with at least one service identifier IDsi associated with a service Si registered on a second computer device S which is different from the first computer device B, said service Sibeing accessible by the user Ui, and, during a transaction, acquiring the digital identifier IDiof a user Ui, transmitting it to the first computer device B for comparison with the registered ID identifiers and searching for and activating, on the computer device S, at least one service associated with the identifier of the user Ui, characterized, in that the new user registration step includes the following steps:
- when a central computer device receives an identifier IDiand a service identifier IDsi, executing a step of generating a master key, characterized in that said master key is a temporary random key X,
- then a step of generating a reference identifier IDRx, calculated by applying a non-reversible reference cryptographic function FR to said key, and of recording in a computer table the unique pair (IDi, IDRx) recorded on the computer device B,
- and lastly a step of generating at least one reference identifier IDSEx, calculated by applying a non-reversible reference cryptographic function FSE different from function FR, to said temporary random key, and of recording in a computer table the unique pair (IDsi, IDSEx) recorded on a computer device S, in that the accomplishment of a transaction includes the following steps:
- when said central computer device receives an identifier IDi, executing a step of searching for the pair (IDi, IDRx) on said first computer device B and applying the inverse function FR-1 to the identifier IDRx to determine the temporary random key,
- and lastly the search for at least one service Sion a second computer device S by applying the function FSE to said temporary random key, in order to calculate the identifier IDSEx and obtain the identifier IDsiassociated with the service Si.
 
Advantageously, it further includes, when a central computer device receives an identifier IDi, a step of generating a reference identifier IDPEx calculated by the application of a non-reversible cryptographic function FPE, different from the reference functions FR and FSE, to said random key X and of recording in a computer table the pair (IDpi, IDPEx), wherein IDpiis an identifier of personal information Pi associated with the user Uiand accessible to the latter, stored on a third computer device P different from said first and second computer devices B and S, and when the transaction is being accomplished, the search for the personal information Pion said third computer device P by applying the function FPE to said temporary random key, in order to calculate the identifier IDPEx and obtain the identifier IPpiassociated with the personal information Pi.
The invention also relates to a set of computer devices for accomplishing secure transactions of a security identifier without a token, characterized in that said set of computer devices comprises a computer device making it possible to access a first computer device B and at least one second service computer device S, and a computer key device forming the support of said non-reversible functions. Preferably, the set further includes computer processing computer devices for accomplishing control, security and plausibility processing of information coming from user devices. The invention also includes a computer program for controlling the execution on a computer device the accomplishment of a secure transaction of a security identifier, without a token, characterized in that it consists of a code controlling the acquisition of a digital identifier coming from remote devices, the processing of said identifiers in accordance with the aforementioned method and the execution of the data exchange protocol between the remote devices and the computer device for the use thereof.
BRIEF DESCRIPTION OF THE DRAWINGSThe invention will be better understood on reading the following description, with reference to the appended drawings, in which:
FIG.1 depicts the hardware architecture of a computer device for the implementation of the invention,
FIG.2 depicts the block diagram of the invention,
FIG.3 depicts the data exchanges diagram for the procedure for a new user enrollment,
FIG.4 depicts the data exchanges diagram for the procedure for enrolling a user to a new service, and
FIG.5 depicts the data exchanges diagram for the procedure to access a service by an enrolled user.
DETAILED DESCRIPTIONHardware Architecture
FIG.1 depicts a schematic diagram of the hardware architecture of a system for the implementation of the invention. The user has a unique identifier that can simply be memorized, or recorded on a peripheral device in the possession of the user and that is transferable to a control terminal by entering it on a keyboard or a touch screen, or by transmitting it from a memory via a physical link such as a connector or an optical link or by radio frequency.
The input and output computer device (0) receives the information flows from user devices, manages the queues, for the on-the-fly distribution on the processing computer device (1) and the returns to the input terminals or the transmission device of the identifier. This input and output device (0) also accomplishes control, security and plausibility processing, as well as transmission operations in order to verify that the transmitted information is indeed compliant. This involves especially checking whether the identifier of the terminal or the device transmitting the identifier (for example its IP address) is on a blacklisted terminal, or if the information has anomalies representative of attempted attacks, saturation or fraud.
The computer device (0) opens a transactional session to interact with the device (1) giving access to the devices (2 to4) in order to obtain user profiles, services and personal information and retroact with the device (0) in order to exchange with the involved user via a transactional session managed in synchronous or asynchronous mode. Regarding the computer devices (2 to4), they manage the consolidated access to the user profiles, services and personal information, by interacting with a computer key device (5) forming the support for the non-reversible functions implemented by the method according to the invention. The computer device (6) makes it possible to administer the entire system especially by keeping the trace of all transactions, in order to allow the audit of the transactions and in the event of a physical crash, the restoration of the transactions.
Functional Diagram of the Invention
FIG.2 depicts an example of a functional diagram,FIGS.3 to5 showing in more detail the information exchanges between the different computing resources implemented, respectively the procedure for a new user enrollment, the procedure for enrolling an enrolled user to a new service, and the procedure for requesting access to a service by an enrolled user.
New User Enrollment Procedure
The new user first proceeds to an enrollment via a computer device (0) as illustrated inFIG.3. He or she opens a session with the computer device (1) and transmits a digital file matching an enrollment request. This file contains an identifier, profile data, and personal data. It can be transmitted in an encrypted form.
The client accesses the service by means of a computer device (0), which comprises means for inputting or transmitting an identifier, for example a keyboard, a QrCode reader, a radiofrequency module, a connector to receive a peripheral device for recording the identifier or an application in charge of transmitting the identifier. This device (0) is connected to a network for opening a session with the system (100) which hosts the set of computer devices constituting the hardware architecture of the invention.
The first function (10) consists in retrieving, controlling and transmitting the information necessary for the transaction, in particular the digital identifier acquired by the computer device (0) as well as associated information (for example the geolocation of the terminal, the identifiers of the terminal or the application in charge of transmitting the identifier (IP address, different identifiers such as SIM card, etc.) or the time stamp), as well as information only on the nature of the transaction. This information comes from the identifier of the provider/terminal pair, for example when it is a terminal of a provider made available to users, or the identification of the service access application. The function (10) also opens a transactional session for each user.
Procedure for Enrolling a User to a New Service
The enrolled user, as explained previously, then proceeds to enroll to services via his or her computer device (0) as illustrated byFIG.4. He or she opens a session with the computer device (1) and transmits a digital file matching a service registration request. This file contains a service identifier, profile data, and personal data. It can be transmitted in an encrypted form.
This process (11) is integrated in a processing chain linked to a transactional session opened for each user by the function (10). For this purpose, each transactional session consists in transmitting, controlling and reconciling the user profiles, the service identifiers and the personal information provided by the function (11), and then obtaining the service selected by the client. This processing (11) is accomplished by the computer device (1), by interacting with the computer devices (2 to4) and (5). The system (100) also integrates administration functions and functions in charge of the traceability and security protocols.
Procedure for Requesting the Access of a User to a Service
The enrolled user, as explained previously, can then proceed to request access to previously enrolled services as illustrated byFIG.5. He or she opens a session with the computer device (1) and transmits a digital file matching a request to access the service. This file contains an identifier and profile data. It can be transmitted in an encrypted form.
This request is verified by the device (1) to verify whether the user is actually enrolled, and if the requested service is enrolled. If this is the case, it transmits the access request to the computer device (2) matching the requested service. This device (2) proceeds to extract the identifier IDRx from the identifier ID and executes a control of the profile recorded in the request. In the event of an erroneous control, the task stops by means of an interruption procedure and optionally a notification to the device (1) which transmits it to the user device (0). If the control is positive, the involved computer device (2) opens a session with the computer device (5) in order to obtain the public key KR and then proceeds to calculate the source value X from a decryption function F−1(KV,Y) as explained in more detail below. This source value thus calculated is controlled by device2 and transmitted to the device (1).
The device then proceeds to making a request to access the service (X) through a session with the device (4), which opens a session with the device (5) in order to transmit a request to access the key KSE. This key KSE is transmitted in response to the device (5), which then proceeds to calculate IDSEx=FR (KPE, X). From this information, the device (5) extracts the identifier IDSiand the service data to transmit them to the device (1) which transmits them via the initially opened session to the user device (0).
Protocols for the Creation of Identifiers and Identification
The following description presents in more detail the protocol for the creation of the identifiers, and then in the following part, the protocol for identification from a digital identifier presented to the system. One of the important goals of the invention is to guarantee data security natively integrated (“by design”) in its architecture due to the fact that the reference identifier of the digital identifier and the reference identifiers of the services are structurally different, their generation being managed by an algorithm based on a one-way cryptographic function so as to be able to perform reconciliations on-the-fly according to transactional needs. The proposed mechanism is based on the use of cryptographic protocols such as AES with keys of size greater than 128 bits, for example RSA with a 2048 bit key.
The operator of the system must select one-way cryptographic functions F for managing its exchanges with the information storage sources used. They will be called hereafter FR (for the reference function), FSE (for the access, storage and update of service information) and FP (for the access, storage and update of personal information). These functions will allow the computer devices (2 to4) to calculate in real time values Y=F(KQ,X) as a function of a source value X and using a public key KQ so that the knowledge of Y does not make it possible to automatically go back to X in an algorithmically realistic way (the reconstruction times of the source value X must be prohibitive in practice). To go back to X, it must be necessary to have a private key KV held secret, which makes it possible to reconstruct X=F−1(KV,Y) from Y by using a decryption function F−1.
The generation of reference identifiers, service identifiers and personal identifiers of a user Uiwill then be done according to the following protocol: The computer device (1) randomly draws a random value X for example using a hash function to statistically avoid collisions. The computer devices (2 to4) interact with the computer device (5) to obtain the public keys KR, KPE and KSE to manage respectively the exchanges involving the identification information, the services and the personal information.
The computer devices (2 to5) fabricate the reference identifier IDR and at least one service identifier IDSE, as well as a personal information identifier IDPE, where appropriate, according to the following simple rules (in the event of collision with an existing identifier, a new value X will be generated):
IDR=FR(KR,X),
IDPE=FPE(KPE,X)
IDSE=FSE(KSE,X).
In this way, the identifiers are indeed linked through X, which makes it possible to reconstitute an identifier from the reference identifier using the private cryptographic key that allows the decryption of the reference identifier and thus to reconstitute the random value X from their knowledge. The client services and the personal information, where appropriate, belonging to a given physical person, recognized by means of his or her digital identifier, will thus be reconstituted.